Ubuntu 1642-1: Lynx vulnerabilities

    Date29 Nov 2012
    CategoryUbuntu
    46
    Posted ByLinuxSecurity Advisories
    Two security issues were fixed in Lynx.
    
    ==========================================================================
    Ubuntu Security Notice USN-1642-1
    November 29, 2012
    
    lynx-cur vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.10
    - Ubuntu 12.04 LTS
    - Ubuntu 11.10
    - Ubuntu 10.04 LTS
    
    Summary:
    
    Two security issues were fixed in Lynx.
    
    Software Description:
    - lynx-cur: Text-mode WWW Browser with NLS support
    
    Details:
    
    Dan Rosenberg discovered a heap-based buffer overflow in Lynx. If a user
    were tricked into opening a specially crafted page, a remote attacker could
    cause a denial of service via application crash, or possibly execute
    arbitrary code as the user invoking the program. This issue only affected
    Ubuntu 10.04 LTS. (CVE-2010-2810)
    
    It was discovered that Lynx did not properly verify that an HTTPS
    certificate was signed by a trusted certificate authority. This could allow
    an attacker to perform a "man in the middle" (MITM) attack which would make
    the user believe their connection is secure, but is actually being
    monitored. This update changes the behavior of Lynx such that self-signed
    certificates no longer validate. Users requiring the previous behavior can
    use the 'FORCE_SSL_PROMPT' option in lynx.cfg. (CVE-2012-5821)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.10:
      lynx-cur                        2.8.8dev.12-2ubuntu0.1
    
    Ubuntu 12.04 LTS:
      lynx-cur                        2.8.8dev.9-2ubuntu0.12.04.1
    
    Ubuntu 11.10:
      lynx-cur                        2.8.8dev.9-2ubuntu0.11.10.1
    
    Ubuntu 10.04 LTS:
      lynx-cur                        2.8.8dev.2-1ubuntu0.1
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1642-1
      CVE-2010-2810, CVE-2012-5821
    
    Package Information:
      https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.12-2ubuntu0.1
      https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.12.04.1
      https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.9-2ubuntu0.11.10.1
      https://launchpad.net/ubuntu/+source/lynx-cur/2.8.8dev.2-1ubuntu0.1
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.11,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":33.33,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.